What is the weakest link in your security?

Here’s a sobering realization: You can have the most sophisticated computer security in the world and it won’t always protect you. Everything you rely on to keep your confidential data secure can be accidentally undone by one employee—in a matter of seconds. That’s because hackers, more and more, are attacking the weakest link in your cybersecurity—your end users. It’s called social engineering. And it’s a serious problem. It’s not new.…

Read More

Microsoft Tech Community

Today was the last day of ITProNetwork on Yammer. We all are glad to 84610 Members that turn this a big network. But with all reasons are explained here – https://blogs.office.com/2016/07/15/announcing-the-public-preview-of-the-new-office-365-network-online-community/ In past years was a pleasure to give contributions, learn, advise and networking. Thank you all and now … Now go to the new Microsoft Tech Community https://techcommunity.microsoft.com. And continue all your great input to turn a bigger community.…

Read More

Raise your security – Privileged Access Workstations

Body: To best secure your environment the best way is reach a goal of security and to accomplish is a best practice to create PAWs in your infrastructure. Privileged Access Workstations (PAWs) provide a dedicated operating system for sensitive tasks that is protected from Internet attacks and threat vectors. Separating these sensitive tasks and accounts from the daily use workstations and devices provides very strong protection from phishing attacks, application and…

Read More